43 research outputs found
FORESAM—FOG paradigm-based resource allocation mechanism for vehicular clouds
The Intelligent Transport Systems (ITS) has the objective quality of transportation improvement through transportation system monitoring and management and makes the trip more comfortable and safer for drivers and passengers. The mobile clouds can assist the ITS in handling the resource management problem. However, resource allocation management in an ITS is challenging due to vehicular network characteristics, such as high mobility and dynamic topology. With that in mind, we propose the FORESAM, a mechanism for resources management and allocation based on a set of FOGs which control vehicular cloud resources in the urban environment. The mechanism is based on a more accurate mathematical model (Multiple Attribute Decision), which aims to assist the allocation decision of resources set that meets the period requested service. The simulation results have shown that the proposed solution allows a higher number of services, reducing the number of locks of services with its accuracy. Furthermore, its resource allocation is more balanced the provided a smaller amount of discarded services
A Design Approach to IoT Endpoint Security for Production Machinery Monitoring
The Internet of Things (IoT) has significant potential in upgrading legacy production machinery with monitoring capabilities to unlock new capabilities and bring economic benefits. However, the introduction of IoT at the shop floor layer exposes it to additional security risks with potentially significant adverse operational impact. This article addresses such fundamental new risks at their root by introducing a novel endpoint security-by-design approach. The approach is implemented on a widely applicable production-machinery-monitoring application by introducing real-time adaptation features for IoT device security through subsystem isolation and a dedicated lightweight authentication protocol. This paper establishes a novel viewpoint for the understanding of IoT endpoint security risks and relevant mitigation strategies and opens a new space of risk-averse designs that enable IoT benefits, while shielding operational integrity in industrial environments
A Bibliometric Analysis and Visualization of Medical Big Data Research
Open Access JournalWith the rapid development of “Internet plus”, medical care has entered the era of big data. However, there is little research on medical big data (MBD) from the perspectives of bibliometrics and visualization. The substantive research on the basic aspects of MBD itself is also rare. This study aims to explore the current status of medical big data through visualization analysis on the journal papers related to MBD. We analyze a total of 988 references which were downloaded from the Science Citation Index Expanded and the Social Science Citation Index databases from Web of Science and the time span was defined as “all years”. The GraphPad Prism 5, VOSviewer and CiteSpace softwares are used for analysis. Many results concerning the annual trends, the top players in terms of journal and institute levels, the citations and H-index in terms of country level, the keywords distribution, the highly cited papers, the co-authorship status and the most influential journals and authors are presented in this paper. This study points out the development status and trends on MBD. It can help people in the medical profession to get comprehensive understanding on the state of the art of MBD. It also has reference values for the research and application of the MBD visualization methods
El mundo de las ciencias de la complejidad
La situaciĂłn es verdaderamente apasionante. Mientras que en el mundo
llamado real –y entonces se hace referencia a dominios como la polĂtica, la
economĂa, los conflictos militares y sociales, por ejemplo–, la percepciĂłn
natural –digamos: de los medios y la opiniĂłn pĂşblica– es que el paĂs y el
mundo se encuentran en condiciones difĂciles; en algunos casos, dramática;
y en muchas ocasiones trágica, en el campo del progreso del conocimiento
asistimos a una magnĂfica vitalidad. Esta vitalidad se expresa en la ciencia de
punta y, notablemente, en las ciencias de la complejidad.
Mientras que la ciencia normal –para volver a la expresión de Kuhn– se
encuentra literalmente a la defensiva en numerosos campos, temas y problemas
–digamos, a la defensiva con respecto al decurso de los acontecimientos
y a las dinámicas del mundo contemporáneo–, en el contexto del estudio de
los sistemas complejos adaptativos asistimos a una vitalidad que es prácticamente
desconocida para la corriente principal de académicos –independientemente
de los niveles en los que trabajan–, de cientĂficos, de administradores
de educaciĂłn y de ciencia y tecnologĂa (por ejemplo rectores, vicerrectores,
decanos, directores de departamentos, tomadores de decisiĂłn, polĂticos y gobernantes).
La corriente principal del conocimiento (mainstream) desconoce
una circunstancia, un proceso, una dinámica que sà es conocida por parte de
quienes trabajan e investigan activamente en el campo de las ciencias de la
complejidad
A PUF-based Secure Communication Protocol for IoT
Security features are of paramount importance for IoT, and implementations are challenging given the
resource-constrained IoT set-up. We have developed a lightweight identity-based cryptosystem suitable for
IoT, to enable secure authentication and message exchange among the devices. Our scheme employs Physically
Unclonable Function (PUF), to generate the public identity of each device, which is used as the public
key for each device for message encryption. We have provided formal proofs of security in the Session Key
security and Universally Composable Framework of the proposed protocol, which demonstrates the resilience
of the scheme against passive as well as active attacks. We have demonstrated the set up required for the
protocol implementation and shown that the proposed protocol implementation incurs low hardware and
software overhead
Mathematics in Software Reliability and Quality Assurance
This monograph concerns the mathematical aspects of software reliability and quality assurance and consists of 11 technical papers in this emerging area. Included are the latest research results related to formal methods and design, automatic software testing, software verification and validation, coalgebra theory, automata theory, hybrid system and software reliability modeling and assessment
Computer Aided Verification
The open access two-volume set LNCS 12224 and 12225 constitutes the refereed proceedings of the 32st International Conference on Computer Aided Verification, CAV 2020, held in Los Angeles, CA, USA, in July 2020.* The 43 full papers presented together with 18 tool papers and 4 case studies, were carefully reviewed and selected from 240 submissions. The papers were organized in the following topical sections: Part I: AI verification; blockchain and Security; Concurrency; hardware verification and decision procedures; and hybrid and dynamic systems. Part II: model checking; software verification; stochastic systems; and synthesis. *The conference was held virtually due to the COVID-19 pandemic